The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has retired 10 Emergency Directives issued between 2019 and 2024, saying that the required actions have been accomplished or are actually coated by Binding Operational Directive 22-01.
CISA stated that is the most important variety of Emergency Directives it has closed at one time.
“By statute, CISA points Emergency Directives to quickly mitigate rising threats and to attenuate the affect by limiting directives to the shortest time attainable,” explains CISA.
“Following a complete assessment of all energetic directives, CISA decided that required actions have been efficiently carried out or are actually encompassed by Binding Operational Directive (BOD) 22-01, Decreasing the Important Threat of Identified Exploited Vulnerabilities. “
Binding Operational Directive 22-01 makes use of the company’s Identified Exploited Vulnerabilities (KEV) catalog to alert federal civilian companies of actively exploited flaws and when techniques have to be patched towards them.
Emergency Directives are supposed to handle pressing dangers and stay in place solely so long as wanted.
The whole listing of Emergency Directives closed as we speak is:
- ED 19-01: Mitigate DNS Infrastructure Tampering
- ED 20-02: Mitigate Home windows Vulnerabilities from January 2020 Patch Tuesday
- ED 20-03: Mitigate Home windows DNS Server Vulnerability from July 2020 Patch Tuesday
- ED 20-04: Mitigate Netlogon Elevation of Privilege Vulnerability from August 2020 Patch Tuesday
- ED 21-01: Mitigate SolarWinds Orion Code Compromise
- ED 21-02: Mitigate Microsoft Alternate On-Premises Product Vulnerabilities
- ED 21-03: Mitigate Pulse Join Safe Product Vulnerabilities
- ED 21-04: Mitigate Home windows Print Spooler Service Vulnerability
- ED 22-03: Mitigate VMware Vulnerabilities
- ED 24-02: Mitigating the Important Threat from Nation-State Compromise of Microsoft Company Electronic mail System
A lot of these directives addressed vulnerabilities that have been exploited rapidly and are actually a part of CISA’s KEV catalog.
Below BOD 22-01, federal civilian companies are required to patch vulnerabilities listed within the KEV catalog by particular dates set by CISA. By default, companies have as much as six months to repair flaws assigned to CVEs earlier than 2021, with newer flaws mounted inside two weeks.
Nonetheless, CISA can set considerably shorter patching timelines when deemed excessive threat.
In a latest instance, companies have been required to patch Cisco gadgets affected by the actively exploited CVE-2025-20333 and CVE-2025-20362 vulnerabilities inside someday.

Whether or not you are cleansing up previous keys or setting guardrails for AI-generated code, this information helps your crew construct securely from the beginning.
Get the cheat sheet and take the guesswork out of secrets and techniques administration.
Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s tendencies as we speak: learn extra, subscribe to our publication, and turn into a part of the NextTech group at NextTech-news.com

